VBrick Systems 7000 manual Logging, Improving Security

Page 31

Generate Security Keys

The security keys used internally by HTTPS and SSH are

 

factory-generated and should be replaced only if security is an

 

issue. Note: Key generation is CPU-intensive and should only be

 

performed when the appliance is idle. It will take 3–5 minutes if

 

the appliance is idle (or much longer if the appliance is in use).

 

 

Security Keys Status

Valid Keys – The existing security keys are valid.

 

Generating Keys – New security keys are being generated.

 

Reboot Required – New security keys have been generated and

 

will take effect after a reboot.

 

 

Improving Security

You can improve security by (1) blocking unauthorized attempts to login and access a device and (2) by reducing exposure to malicious software attacks. The most common vulnerability is related to user accounts and passwords. After a successful installation, you should immediately change the default passwords. Many attacks come from within an organization and this helps to minimize the risk. The VBAdmin login is generally secure since it utilizes encryption techniques to hide usernames and passwords from network spyware.

Malicious software covertly attaches itself to unsuspecting devices. These programs are generally designed to compromise personal information or to create system havoc. Since the VBrick appliance uses an industrial-grade operating system, it is less susceptible to malicious software and unlikely to be a target of programs designed to attack PC-based systems like Microsoft, Linux, and others. However, you can still take additional steps to minimize risk. VBrick tries to make installation as simple and quick installation and many features are automatically enabled by default even though you may not need them. You can selectively disable unneeded features to reduce vulnerability. Another common problem is Denial of Service (DoS) attacks. A DoS sends floods of packets to an unsuspecting remote system in an attempt to disrupt or stop normal operation. These unsuspecting remote systems are typically discovered using ICMP or Ping. It is standard industry practice to block all ICMP and Ping requests from off-net foreign hosts. This is typically done in a centralized location using router/firewall technology which is more successful and cost effective than resolving the issue at each host.

Logging

Logging of certain events can be stored both locally (within the VBrick device) or externally (for example on a server). Local logs are stored in volatile memory. For preservation of information, it is recommended that remote logging be utilized. Remote servers generally offer ample storage and offer the additional benefit of collecting log information from several VBricks simultaneously. When logging externally, specify either the IP address or hostname of the actual server using the Remote Event Log Destination field. If remote logging is enabled, the log information is sent via SNMP traps. When you enable logging, be sure to set the system date and time (see System Time on page 11) or select a network time server in order to get accurate time stamps in the logs.

22

© 2009 VBrick Systems, Inc.

Image 31
Contents VBrick 7000 Series Network Video Appliances Copyright Page Contents Video/Audio Configuration VBrick H.264 Appliance Admin Guide Contents Admin Guide Font Conventions Home IntroductionVBAdmin LEDs Login VBAdmin OverviewConfiguration Quick Start Configuration OverviewTransmitters Video ConfigurationAudio Configuration Program ConfigurationGetting Help Configuring Local Online HelpServers Network System ConfigurationApplication tools. The Host Name syntax can be a maximum Network Time Synchronization Domain Name ServerSystem Identification GeneralFront Panel System ModeSystem Reset System TimeF1 Start Transmitting Usernames & Passwords Reset System Configuration Manage ConfigurationRead System Configuration Auto Configuration Restore System ConfigurationSample Script Feature LicenseManagement SAP Advanced ConfigurationsSystem Configuration Security Appliance Improving Security LoggingEvent Triggering Run Scripts Using VBAdmin Scripting Syntax Run Scripts Using Event TriggersPassthrough Passthrough State Responder Passthrough State Initiator SNMPv3 Passwords Snmp Traps Trap Description VBrick Systems, Inc Video Video/Audio ConfigurationShows the video input connectors on the rear panel. Select Adding Tint reduces the saturation Video Template SettingsWhether or not changes have been made. Select Load Template Smaller value is recommended otherwise, use a larger value Audio Video/Audio Configuration VBrick Systems, Inc AAC-HE Audio Template SettingsAAC-HE Global Program ConfigurationPriority Level Type of Service Example ProgramsPrograms Part 2 Advanced Settings Transmitter Settings Transmitters Server SettingsSDP and Announcements Program number, Y is the transmitter number Announce Settings External Announce Settings Servers VBrick Systems, Inc Using an EtherneTV Portal Server, enter the Portal Server IP VBrick Systems, Inc System MonitorSystem Information Manufacturing Information System Restart Video Video/AudioAudio Rate1 System LogsAudio Video Rate1Monitor Programs Program StatusTransmitters Servers Clients Monitor VBrick Systems, Inc Ping Test Result Ping TestTraceRoute Test Ping Test SettingDevice Tests Trace Route Test ConfigurationTrace Route Test Result Maintenance Mode Maintenance Mode CLI Limited Run ModeVBrick Systems, Inc

7000 specifications

VBrick Systems 7000 is a comprehensive video streaming solution designed to facilitate high-quality video delivery over IP networks for enterprises and organizations. This platform stands out due to its versatility, allowing users to transmit video content seamlessly in a variety of formats.

One of the main features of the VBrick 7000 is its ability to support both live streaming and on-demand video broadcasting. Organizations can broadcast live events, conferences, or webinars directly to their audience while also archiving these events for future viewing. The dual functionality enhances user engagement and ensures that important content is accessible at all times.

The VBrick 7000 also excels in its integration capabilities. It is designed to work seamlessly with a range of third-party applications, including content management systems and enterprise communication platforms. This ensures that organizations can easily incorporate video into their existing workflows without significant disruptions.

In terms of technology, the VBrick 7000 utilizes advanced encoding and transcoding capabilities. This allows it to deliver high-definition video while optimizing bandwidth usage. The platform supports various streaming protocols, ensuring compatibility with a wide range of devices and networks. Whether accessed on desktop computers, smartphones, or tablets, users experience consistent and reliable video playback.

Another characteristic of the VBrick 7000 is its scalability. It can accommodate growing organizations by supporting multiple concurrent streams without compromising performance. This scalability is crucial for businesses that anticipate increasing their internal video communications or expanding their audience reach.

Security is also a priority for the VBrick 7000. With features like encryption and user authentication, organizations can ensure that their content is protected from unauthorized access. This is particularly important for enterprises that require confidentiality in their communications or are subject to regulatory compliance.

Additionally, the VBrick 7000 offers robust analytics tools. Users can track viewership metrics, engagement levels, and content performance, enabling data-driven decisions regarding future video content and marketing strategies.

In conclusion, the VBrick Systems 7000 is a powerful video streaming solution that combines scalability, security, and integration capabilities. Its advanced technologies ensure high-quality video delivery, making it an attractive choice for organizations looking to enhance their video communication strategies.